CN107679417A - A kind of method and system of user's operating right management - Google Patents
A kind of method and system of user's operating right management Download PDFInfo
- Publication number
- CN107679417A CN107679417A CN201710930003.9A CN201710930003A CN107679417A CN 107679417 A CN107679417 A CN 107679417A CN 201710930003 A CN201710930003 A CN 201710930003A CN 107679417 A CN107679417 A CN 107679417A
- Authority
- CN
- China
- Prior art keywords
- user
- function
- role
- user role
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000006870 function Effects 0.000 claims description 140
- 238000004590 computer program Methods 0.000 claims description 10
- 238000007726 management method Methods 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005315 distribution function Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 230000004043 responsiveness Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
Method, system and the relevant apparatus of a kind of user's operating right management provided herein, methods described include:When receiving login instruction, obtain and log in user role corresponding to instruction;The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the list of functional role permissions list corresponding function authority credentials between each function items and user role;User role is compared with functional role permissions list, obtains function privilege set corresponding to user role;Determine that logging in instruction allows the function items of operation according to function privilege set.The associated rights data of user role is deposited in the form of self-defined constant, and deposited the configuration limits of function items as attribute, so when user logs in, the judgement of function privilege is carried out to user role, obtaining the user role allows the function items set of operation, and then its operating right is managed.
Description
Technical field
The application is related to field of storage, more particularly to a kind of method, the system of the management of user's operating right, and a kind of meter
Calculation machine storage medium and a kind of terminal.
Background technology
Under current techniques, the management of user role authority is mostly on the basis of user, and no role is distributed for user,
And then distribute different function privilege operations.By configuring the role of user, when users log on, its role is obtained by user
Authority, and then obtain the function privilege that active user can operate.When for user's distribution function when, it is typically complete with one
Function be unit, hide or distribute to user, current functional unit can not be split again.Checked as domestic consumer only has
Authority, in the current page, to check that operation for function distinguishing, is divided into M subfunctions and N subfunctions, no again in look facility
Limitation of the domestic consumer to M and N functions can further be limited.
From function realization, the realization of current many technologies is the role that configured in advance completes user, is reconfigured at role couple
The function privilege answered, the data of configuration can also be in the json configuration files in service end in database side.Stepped in user
When recording system, service end reads the configuration of user, obtains function privilege corresponding to currently logged on user, and then load different
Function.
When existing application of function is when in storage, in storage system, if one database of installation preserves the power of user
Limit configuration, to a certain extent database not only occupy the system resource of storage as just the medium of storage user right,
It is and inconsistent with the management software framework (not needing database) of former storage system.The equipment as data storage is stored, all
It is that the data interaction for completing front and back end is ordered by CLI (Command Language Interface, Command Line Interface), if
User right configuration is preserved using configuration file, then read-write of deposit position and file of configuration file etc., which will also result in, is
The decline for performance of uniting.
In order to GUI (Graphical User Interface, computer operation user interface) management software framework phase
Fusion, and H.D high responsiveness energy is carried, such as why not user right data are stored in DBAS, by right
The access of database obtains configuration data, also user right data is not deposited by using the form of configuration file, by text
The read-write of part obtains configuration data, is that the application needs to solve the problems, such as.
Apply for content
The purpose of the application is to provide a kind of method, system and the relevant apparatus of the management of user's operating right, solves existing
Having needs in technology by accessing database or reading the problem of configuration file is to obtain user's corresponding configuration data.
In order to solve the above technical problems, the application provides a kind of method of user's operating right management, technical scheme is as follows:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role
The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role
Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
Wherein, before the user right is compared with functional role permissions list, in addition to:
In the DOM element of each function items, permission attributes are set up;
The function privilege value of the permission attributes is configured, generates the functional role permissions list.
Wherein, after reading the self-defined constant in the login instruction to obtain corresponding user role, in addition to:
The information of the user role is stored in Session objects.
Wherein, the user role is compared with the functional role permissions list, obtains the user role pair
The function privilege set answered includes:
The functional role permissions list is traveled through, judges that the user role whether there is and is weighed in function corresponding to function items
In limit value;
If in the presence of by the function items write-in function privilege set.
The application also provides a kind of system of user's operating right management, including:
Acquisition module, when logging in instruction for receiving, obtain user role corresponding to the login instruction;
Read module, for reading the self-defined constant logged in instruction, obtain functional role permissions list;Its
In, the list of functional role permissions list corresponding function authority credentials between each function items and user role;
Comparing module, for the user role to be compared with the functional role permissions list, obtain the use
Function privilege set corresponding to the role of family;
Determining module, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
Wherein, the system also includes:
Setup module, in the DOM element of each function items, setting up permission attributes;
Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role
Permissions list.
Wherein, the system also includes:
Memory module, for the information of the user role to be stored in Session objects.
Wherein, the comparing module includes:
Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function
In function privilege value corresponding to;
Writing unit, when being present in for the user role in function privilege value corresponding to function items, by the function
Item writes the function privilege set.
The application also provides a kind of computer-readable recording medium, is stored thereon with computer program, the computer journey
Following steps are realized when sequence is performed:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role
The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role
Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
The application also provides a kind of terminal, including memory and processor, has computer program in the memory, institute
State when processor calls the computer program in the memory and realize following steps:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role
The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role
Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
Method, system and the relevant apparatus of a kind of user's operating right management provided herein, methods described include:
When receiving login instruction, obtain and log in user role corresponding to instruction;The self-defined constant logged in instruction is read, obtains work(
Can role-security list;Wherein, functional role permissions list corresponding function authority credentials between each function items and user role
List;User role is compared with functional role permissions list, obtains function privilege set corresponding to user role;According to
Function privilege set determines that logging in instruction allows the function items of operation.The phase of user role is deposited in the form of self-defined constant
Permissions data is closed, and is deposited the configuration limits of function items as attribute, so when user logs in, user role is carried out
The judgement of function privilege, obtaining the user role allows the function items set of operation, and then its operating right is managed.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of application, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
A kind of flow chart of the method for user's operating right management that Fig. 1 is provided by the embodiment of the present application;
The flow chart of the method for another user's operating right management that Fig. 2 is provided by the embodiment of the present application;
A kind of system structure diagram for user's operating right management that Fig. 3 is provided by the embodiment of the present application.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
It refer to Fig. 1, a kind of flow of the method for user's operating right management that Fig. 1 is provided by the embodiment of the present application
Figure, concrete technical scheme are as follows:
S101:When receiving login instruction, user role corresponding to the login instruction is obtained;
When there is user's login, that is, when receiving login instruction, the user role according to corresponding to obtaining login instruction.Cause
There may be multiple user roles for same user, but the log-on message of each user role is unique, passes through log-on message
It is also unique that instruction is logged in during login, therefore is the user role according to corresponding to obtaining login instruction, and can not obtain user
Corresponding user role.The identity of user, and its exercisable function privilege etc. are not limited herein.Each user role is corresponding
User right be unique, but different user roles can correspond to same user right, such as user 1 and user 2
User right first can be corresponded to simultaneously.
It is pointed out that the user role has its corresponding user right, also within the scope of the acquisition of this step.Cause
This is in systems, if it is that user right determines according to corresponding to user role to have access operating right.
Therefore, this step is intended to obtain user corresponding to the user role and the user role corresponding with logging in instruction
Authority.
It is noted that after getting user role, the information of user role can also be stored in Session objects
In.Session objects are in java engineerings, and the object of front end and service end interaction, user can customize to deposit into Session
Data, and in the jsp pages, quote session, obtain data therein;Session presence services end, life cycle is once
Session.Other, which can certainly be stored in, is beneficial in the object of the application operation, is not construed as limiting herein.
S102:The self-defined constant logged in instruction is read, obtains functional role permissions list;
Wherein, the row of functional role permissions list corresponding function authority credentials between each function items and user role
Table.Because being that the data of configuration are stored in database or are stored in json configuration files in the prior art, this just needs and number
A series of information exchange is carried out according to storehouse or reads configuration file.And the application is then with self-defined normal by related configuration data
The form storage of amount.
Self-defined constant, exactly in order to realize this function, a variable of our oneself definition, and start in service
When, it has been this variable assignments, as constant.Related to this, also a global constant, global constant are as current
After service starts up, follow-up any operation is all without the data value in change current variable.This self-defined constant can
Directly in the code of front end, to define a constant, what is deposited is functional role permissions list corresponding to current function items.It is excellent
Choosing, this constant can be self-defined global constant, because functional role permissions list corresponding to each function items generally exists
It will not easily change after setting, be operated in actual use according to this functional role permissions list.It may be noted that
, functional role permissions list be not meant to its existence form can only in the form of a list, as long as function items can be embodied
The form of expression of corresponding relation between user right, all should be in the protection domain of the application.Constant on definition
Content and form, it should be configured, be not limited thereto according to actual conditions by those skilled in the art.
Referring to table 1, table 1 is a kind of specific functional role permissions list.It is it should be noted that clear in order to state in table
Chu, the relation between function items A, B, C, D and user right first, second, third, fourth, penta is embodied with true or false,
True, which represents the function items, allows the user right of operation, and false represents the user right of the function items quiescing.Such as work(
Energy item A allows the user right of operation to be first, second and third.The table is intended merely to embody the pass between function items and user right
System, in the presence of reality is in the form of constant, the code of A={ " first ", " second ", " third " } this aggregate form can be analogous to,
The user right for not having corresponding relation with function items can be deleted.On the basis of function privilege, corresponding is user role number
According to can be deposited in the form of one-to-many.In practical application, generally each function items individually have one to allow to operate corresponding to it
Functional role permissions list.
In the application, user right can be specific to some specific function in current page.In the design of the page, pin
To in DOM (Document Object Model, DOM Document Object Model) element of each function items, increasing permission category newly
Property, by configuring the value values of permission attributes, i.e. function privilege value.Renaming as there is editor to roll up in the page operates,
Permission functional configuration is configurable to permission=" vdiskEdit ", shows what current DOM element provided
Function only has the role with vdiskEdit function privileges to be operated.
The functional role permissions list of table 1
It should be noted that function items herein can be the subfunction item for more refining to obtain to original function, example
M functions and N functions as mentioned in the background art can be used as One function item.
S103:The user role is compared with the functional role permissions list, obtains the user role pair
The function privilege set answered;
Before this step, the corresponding relation between user role and user right, function items and user are had existed for
Corresponding relation (these are all by self-defined constant definition certainly) between authority, therefore can be closed by above-mentioned two is corresponding
System obtains the corresponding relation between function items and user role, convenient for statement, referred to as corresponding relation X.Now, will need to only step on
User role corresponding to record instruction is compared with corresponding relation X, you can obtains allowing operation corresponding to the user role
Function privilege set.The login instructs the obtained function with operating right according to being in the set.It should be noted that
Corresponding relation X can be by XA、XB、XCThe collective combinations that user role is corresponded to etc. each function items form.Now, X need to be traveled throughA、XB、
XCEtc. each set, function privilege set is obtained.
Preferably, the embodiment of the step can be:
The functional role permissions list is traveled through, judges that the user role whether there is and is weighed in function corresponding to function items
In limit value;If in the presence of by the function items write-in function privilege set.
Function privilege value is not a value, is actually the set array of a user role.The meaning of write-in will permit
Perhaps the function items operated are added in function privilege set, and specific writing mode is not construed as limiting.
S104:The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
After obtaining function privilege set, displaying or the operational circumstances of each function items can be designed according to the set.Work as user
When role is not present, such as in the absence of XAWhen middle, illustrate no operating right, function items corresponding to current DOM element can be set
For that can not click on or hide function items corresponding to the DOM element.
The embodiment of the present application provides a kind of method of user's operating right management, and can be realized by the above method will power
Limit on application configuration function items, avoid installation database either configuration file storage configuration data, while saved storage
The memory space of equipment in itself, also improve the configuration performance of user right.
Based on above-described embodiment, the present embodiment provides a kind of method of more detailed user's operating right management, specific skill
Art scheme is as follows:
S201:When receiving login instruction, user role corresponding to the login instruction is obtained;
S202:The self-defined constant logged in instruction is read, obtains functional role permissions list;
S203:The functional role permissions list is traveled through, judges that the user role whether there is in corresponding to function items
In function privilege value;If so, into step S204;If it is not, into step 205;
S204:The function items are write into the function privilege set;Then into step S206;
S205:Hide the function items;
S206:The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
A kind of system of the user's operating right management provided below the embodiment of the present application is introduced, described below
System and the method for above-described user's operating right management can be mutually to should refer to.
Referring to Fig. 3, a kind of system architecture signal for user's operating right management that Fig. 3 is provided by the embodiment of the present application
Figure, the system can include:
Acquisition module 100, when logging in instruction for receiving, obtain user role corresponding to the login instruction;
Read module 200, for reading the self-defined constant logged in instruction, obtain functional role permissions list;
Wherein, the list of functional role permissions list corresponding function authority credentials between each function items and user role;
Comparing module 300, for the user role to be compared with the functional role permissions list, obtain described
Function privilege set corresponding to user role;
Determining module 400, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
Based on above-described embodiment, as preferred embodiment, the system can also include:
Setup module, in the DOM element of each function items, setting up permission attributes;
Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role
Permissions list.
Based on above-described embodiment, as preferred embodiment, the system can also include:
Memory module, for the information of the user role to be stored in Session objects.
Based on above-described embodiment, as preferred embodiment, the comparing module can include:
Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function
In function privilege value corresponding to;
Writing unit, when being present in for the user role in function privilege value corresponding to function items, by the function
Item writes the function privilege set.
Present invention also provides a kind of computer-readable recording medium, there is computer program thereon, the computer program
The step of above-described embodiment provides can be realized when being performed.The storage medium can be:USB flash disk, mobile hard disk, read-only storage
Device (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or light
Disk etc. is various can be with the medium of store program codes.
Present invention also provides a kind of terminal, can include memory and processor, have computer in the memory
Program, when the processor calls the computer program in the memory, it is possible to achieve the step of above-described embodiment provides.
Certain terminal can also include the component such as various network interfaces, power supply.
Each embodiment is described by the way of progressive in specification, and what each embodiment stressed is and other realities
Apply the difference of example, between each embodiment identical similar portion mutually referring to.For embodiment provide system and
Speech, because it is corresponding with the method that embodiment provides, so description is fairly simple, related part is referring to method part illustration
.
Method, system and the relevant apparatus of a kind of user's operating right management provided herein have been carried out in detail above
It is thin to introduce.Specific case used herein is set forth to the principle and embodiment of the application, and above example is said
It is bright to be only intended to help and understand the present processes and its core concept.It should be pointed out that the ordinary skill for the art
For personnel, on the premise of the application principle is not departed from, some improvement and modification, these improvement can also be carried out to the application
Also fallen into modification in the application scope of the claims.
It should also be noted that, in this manual, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that
A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except other identical element in the process including the key element, method, article or equipment being also present.
Claims (10)
- A kind of 1. method of user's operating right management, it is characterised in that including:When receiving login instruction, user role corresponding to the login instruction is obtained;The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role authority The list of list corresponding function authority credentials between each function items and user role;The user role is compared with the functional role permissions list, function corresponding to the user role is obtained and weighs Limit set;The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
- 2. according to the method for claim 1, it is characterised in that carry out the user right and functional role permissions list Before comparison, in addition to:In the DOM element of each function items, permission attributes are set up;The function privilege value of the permission attributes is configured, generates the functional role permissions list.
- 3. according to the method for claim 2, it is characterised in that read the self-defined constant in the login instruction to obtain After corresponding user role, in addition to:The information of the user role is stored in Session objects.
- 4. according to the method for claim 3, it is characterised in that by the user role and the functional role permissions list It is compared, obtaining function privilege set corresponding to the user role includes:The functional role permissions list is traveled through, judges that the user role whether there is in function privilege value corresponding to function items In;If in the presence of by the function items write-in function privilege set.
- A kind of 5. system of user's operating right management, it is characterised in that including:Acquisition module, when logging in instruction for receiving, obtain user role corresponding to the login instruction;Read module, for reading the self-defined constant logged in instruction, obtain functional role permissions list;Wherein, institute State the list of functional role permissions list corresponding function authority credentials between each function items and user role;Comparing module, for the user role to be compared with the functional role permissions list, obtain the user angle Function privilege set corresponding to color;Determining module, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
- 6. system according to claim 5, it is characterised in that also include:Setup module, in the DOM element of each function items, setting up permission attributes;Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role authority List.
- 7. system according to claim 6, it is characterised in that also include:Memory module, for the information of the user role to be stored in Session objects.
- 8. system according to claim 7, it is characterised in that the comparing module includes:Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function items pair In the function privilege value answered;Writing unit, when being present in for the user role in function privilege value corresponding to function items, the function items are write Enter the function privilege set.
- 9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program quilt The method as described in claim any one of 1-4 is realized during execution.
- A kind of 10. terminal, it is characterised in that including memory and processor, there is computer program in the memory, it is described Processor realizes the method as described in claim any one of 1-4 when calling the computer program in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710930003.9A CN107679417B (en) | 2017-10-09 | 2017-10-09 | Method and system for managing user operation authority |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710930003.9A CN107679417B (en) | 2017-10-09 | 2017-10-09 | Method and system for managing user operation authority |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107679417A true CN107679417A (en) | 2018-02-09 |
CN107679417B CN107679417B (en) | 2021-01-12 |
Family
ID=61139286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710930003.9A Active CN107679417B (en) | 2017-10-09 | 2017-10-09 | Method and system for managing user operation authority |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679417B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804946A (en) * | 2018-06-12 | 2018-11-13 | 成都优易数据有限公司 | A kind of table button authority control method based on Vue.js |
CN109284602A (en) * | 2018-09-13 | 2019-01-29 | 广东电网有限责任公司 | A kind of authority configuring method and system |
CN109669864A (en) * | 2018-12-05 | 2019-04-23 | 郑州云海信息技术有限公司 | A kind of authority control method and device based on test and management |
CN110334541A (en) * | 2019-06-14 | 2019-10-15 | 平安科技(深圳)有限公司 | A kind of method and relevant apparatus of system administration |
CN110995699A (en) * | 2019-11-29 | 2020-04-10 | 云深互联(北京)科技有限公司 | Unified management and control method, management and control end, client and equipment for network security |
WO2020097863A1 (en) * | 2018-11-15 | 2020-05-22 | 深圳市欢太科技有限公司 | Flashing control method, flashing control apparatus and terminal device |
WO2020233039A1 (en) * | 2019-05-22 | 2020-11-26 | 深圳壹账通智能科技有限公司 | User operation permission control method and apparatus, device, and medium |
CN112596711A (en) * | 2020-12-24 | 2021-04-02 | 福建升腾资讯有限公司 | Personalized authority management setting method and system based on Web system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1967560A (en) * | 2006-11-09 | 2007-05-23 | 华为技术有限公司 | Controlling method of business operations competence and generating method of relational database |
CN101441688A (en) * | 2007-11-20 | 2009-05-27 | 阿里巴巴集团控股有限公司 | User authority allocation method and user authority control method |
US20100235885A1 (en) * | 2009-03-11 | 2010-09-16 | Jan Patrik Persson | Secure Client-Side Aggregation of Web Applications |
CN102467642A (en) * | 2010-11-17 | 2012-05-23 | 北大方正集团有限公司 | Permission control method and device for application software |
CN103020498A (en) * | 2012-11-19 | 2013-04-03 | 广东亚仿科技股份有限公司 | Intelligent dynamic access control method and system |
CN103324470A (en) * | 2012-03-21 | 2013-09-25 | 阿里巴巴集团控股有限公司 | Web system generation method and device |
US20150358331A1 (en) * | 2014-06-10 | 2015-12-10 | Verizon Patent And Licensing Inc. | Identity management, authorization and entitlement framework |
CN106650414A (en) * | 2016-12-28 | 2017-05-10 | 广州杰赛科技股份有限公司 | User authority management method and system |
CN107180192A (en) * | 2017-05-09 | 2017-09-19 | 北京理工大学 | Android malicious application detection method and system based on multi-feature fusion |
-
2017
- 2017-10-09 CN CN201710930003.9A patent/CN107679417B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1967560A (en) * | 2006-11-09 | 2007-05-23 | 华为技术有限公司 | Controlling method of business operations competence and generating method of relational database |
CN101441688A (en) * | 2007-11-20 | 2009-05-27 | 阿里巴巴集团控股有限公司 | User authority allocation method and user authority control method |
US20100235885A1 (en) * | 2009-03-11 | 2010-09-16 | Jan Patrik Persson | Secure Client-Side Aggregation of Web Applications |
CN102467642A (en) * | 2010-11-17 | 2012-05-23 | 北大方正集团有限公司 | Permission control method and device for application software |
CN103324470A (en) * | 2012-03-21 | 2013-09-25 | 阿里巴巴集团控股有限公司 | Web system generation method and device |
CN103020498A (en) * | 2012-11-19 | 2013-04-03 | 广东亚仿科技股份有限公司 | Intelligent dynamic access control method and system |
US20150358331A1 (en) * | 2014-06-10 | 2015-12-10 | Verizon Patent And Licensing Inc. | Identity management, authorization and entitlement framework |
CN106650414A (en) * | 2016-12-28 | 2017-05-10 | 广州杰赛科技股份有限公司 | User authority management method and system |
CN107180192A (en) * | 2017-05-09 | 2017-09-19 | 北京理工大学 | Android malicious application detection method and system based on multi-feature fusion |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804946A (en) * | 2018-06-12 | 2018-11-13 | 成都优易数据有限公司 | A kind of table button authority control method based on Vue.js |
CN109284602A (en) * | 2018-09-13 | 2019-01-29 | 广东电网有限责任公司 | A kind of authority configuring method and system |
WO2020097863A1 (en) * | 2018-11-15 | 2020-05-22 | 深圳市欢太科技有限公司 | Flashing control method, flashing control apparatus and terminal device |
CN112654964A (en) * | 2018-11-15 | 2021-04-13 | 深圳市欢太科技有限公司 | Brush machine control method, brush machine control device and terminal equipment |
CN109669864A (en) * | 2018-12-05 | 2019-04-23 | 郑州云海信息技术有限公司 | A kind of authority control method and device based on test and management |
WO2020233039A1 (en) * | 2019-05-22 | 2020-11-26 | 深圳壹账通智能科技有限公司 | User operation permission control method and apparatus, device, and medium |
CN110334541A (en) * | 2019-06-14 | 2019-10-15 | 平安科技(深圳)有限公司 | A kind of method and relevant apparatus of system administration |
CN110334541B (en) * | 2019-06-14 | 2024-03-01 | 平安科技(深圳)有限公司 | System management method and related device |
CN110995699A (en) * | 2019-11-29 | 2020-04-10 | 云深互联(北京)科技有限公司 | Unified management and control method, management and control end, client and equipment for network security |
CN112596711A (en) * | 2020-12-24 | 2021-04-02 | 福建升腾资讯有限公司 | Personalized authority management setting method and system based on Web system |
Also Published As
Publication number | Publication date |
---|---|
CN107679417B (en) | 2021-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107679417A (en) | A kind of method and system of user's operating right management | |
US10114964B2 (en) | Role-based content rendering | |
US9805209B2 (en) | Systems and methodologies for managing document access permissions | |
CN110569657B (en) | Data access method, device, equipment and storage medium | |
CN110443010A (en) | One kind permission visual configuration control method, device, terminal and storage medium in information system | |
US10740286B1 (en) | Migration task validation before data migration | |
US20130311631A1 (en) | Integrated cloud data center management | |
CN104951527A (en) | System and method for rapid configuration of database management background | |
US11416630B1 (en) | User programmatic interface for supporting data access control in a database system | |
CN110489994B (en) | File authority management method and device for nuclear power station and terminal equipment | |
CN105184145A (en) | Permission management method and management apparatus | |
US20200233907A1 (en) | Location-based file recommendations for managed devices | |
CN105207989B (en) | A kind of work system and its control method of various dimensions user | |
CN114817901A (en) | Authority management method, related device and medium | |
CN108009444A (en) | Authority control method, device and the computer-readable recording medium of full-text search | |
CN111241107A (en) | Service processing method, device, medium and electronic equipment | |
US9904452B2 (en) | Building user specific user interface instances | |
US10169055B2 (en) | Access identifiers for graphical user interface elements | |
Chaganti et al. | Amazon SimpleDB developer guide | |
CN103809947A (en) | Automatic release method and system for development requirement | |
CN115543428A (en) | Simulated data generation method and device based on strategy template | |
CN113076086B (en) | Metadata management system and method for modeling model object using the same | |
CN113031928B (en) | Web system generation method and device, electronic equipment and computer readable storage medium | |
CN113849158A (en) | JSON-based interface factory system, interface generation method and medium thereof | |
Guthrie et al. | Building Cloud Apps with Microsoft Azure: Best practices for DevOps, data storage, high availability, and more |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201202 Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd. Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601 Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |